Re: Re: [qubes-users] Q4rc4 :: qvm-prefs-screenshot-to-clipboard - 1st attempt

2018-02-18 Thread Yuraeitha
On Sunday, February 18, 2018 at 11:32:16 PM UTC+1, awokd wrote:
> On Sun, February 18, 2018 10:24 pm, Yuraeitha wrote:
> 
> > hmm, thinking about it, did you try awokd's approach?
> 
> He had but it wasn't working so I was just suggesting trying out a
> different command line option for xclip. Could be because it was in a
> different session or something, like you're saying.

@awokd 
Most likely yes, I haven't seen a command that can't be run from dom0 yet, it 
just need a little spanki'... Ahem, love. 

I haven't yet fully grasped why some commands behave different as they do when 
from dom0, compared to when same command is executed inside the AppVM. For 
example the bash example above. But I imagine, grasping this difference, one 
can probably execute anything from dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d5e105c6-8007-48c7-9a60-303bdf4c5453%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: Re: [qubes-users] Q4rc4 :: qvm-prefs-screenshot-to-clipboard - 1st attempt

2018-02-18 Thread 'awokd' via qubes-users
On Sun, February 18, 2018 10:24 pm, Yuraeitha wrote:

> hmm, thinking about it, did you try awokd's approach?

He had but it wasn't working so I was just suggesting trying out a
different command line option for xclip. Could be because it was in a
different session or something, like you're saying.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61986be918df1dab4a84817f42f123ab.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: Re: [qubes-users] Q4rc4 :: qvm-prefs-screenshot-to-clipboard - 1st attempt

2018-02-18 Thread Yuraeitha
On Sunday, February 18, 2018 at 1:11:58 AM UTC+1, [799] wrote:
> Hello awokd,
> 
>  Original-Nachricht 
> An 17. Feb. 2018, 23:41, 'awokd' via qubes-users schrieb:
> 
> > Can't really find a man page for xclip. What
> > happens when you run this in dom0? 
> 
> xclip doesn't have to be present in dom0 as the command is only used in the 
> AppVM.
> As such you might need to install it in your template VM.
> 
> In dom0 you are only using gnome-screenshot to make the screenshot.
> If it is not available in dom0 you can install it via qubes-dom0-update 
> gnome-screenshot or use any other existing sxreenshot-app which is available 
> in your dom0 and offers the option to safe screenshots directly to file.
> 
> Question regarding security:
> As far as I can tell I don't think that the suggested solution to transfer 
> screenshots to an AppVM offers a great security risk as the data is only 
> flowing from (!) dom0 to your AppVM and the graphic file is creating in dom0.
> But as I am far away from being a security expert, I'd like to hear a more 
> qualified feedback if working with this script might be a bad idea.
> 
> Regards
> 
> [799]

hmm, thinking about it, did you try awokd's approach? I do something very 
similar for my QubesTV setup that I'm working on polishing, which works on 
scripts too, like we're doing here. The command may have to be adjusted a bit, 
but in general, it should work, even without xclip in dom0. 

Actually, I'd go as far as to say it should most definitely work for xclip, 
while my scripts here are different, I've done it enough to tell it can work if 
modified correctly.

Either way, try awokd's command out, it will definitely work in one variant or 
different. The question is if require a bit of modification. For example, maybe 
use "qvm-run AppVM bash 'command to execute inside AppVM -o etc. lalala'" 
instead of say, "qvm-run AppVM gnome-terminal -e 'command to execute inside 
AppVM -o etc. lalala'". 

For example I've seen a case where one when executed inside the AppVM, will 
open the executed QubesTV streaming link in the same browser, same tab, while 
the very same command inserted into the AppVM from dom0, would open up a whole 
new instance of Firefox, and thereby open a new window. Which, needless to say, 
doesn't work. The solution was to use bash for already running firefox, so that 
it won't start a new firefox instance. Hopefully you can use any of this to 
make qvm-run appvm "command" work.

In terms of security, I'm in the same boat, I can't say for sure. But I agree 
with the notion, that it "probably"? is secure due to the one direction flow of 
data.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8bc85072-ac09-4ccc-8915-331ea300a33f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


AW: Re: [qubes-users] Q4rc4 :: qvm-prefs-screenshot-to-clipboard - 1st attempt

2018-02-17 Thread '[799]' via qubes-users
Hello awokd,

 Original-Nachricht 
An 17. Feb. 2018, 23:41, 'awokd' via qubes-users schrieb:

> Can't really find a man page for xclip. What
> happens when you run this in dom0?

xclip doesn't have to be present in dom0 as the command is only used in the 
AppVM.
As such you might need to install it in your template VM.

In dom0 you are only using gnome-screenshot to make the screenshot.
If it is not available in dom0 you can install it via qubes-dom0-update 
gnome-screenshot or use any other existing sxreenshot-app which is available in 
your dom0 and offers the option to safe screenshots directly to file.

Question regarding security:
As far as I can tell I don't think that the suggested solution to transfer 
screenshots to an AppVM offers a great security risk as the data is only 
flowing from (!) dom0 to your AppVM and the graphic file is creating in dom0.
But as I am far away from being a security expert, I'd like to hear a more 
qualified feedback if working with this script might be a bad idea.

Regards

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AL37bZG5Hx8rhAmBB80s4QVshi6YjlRISmbEnM42yYLv9BqzzHVR4jhtdAWqBeKkK0F_USpF3VLbx_pk4IALInqtkXZS7nZE5TtDr3zFo9c%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Q4rc4 :: qvm-prefs-screenshot-to-clipboard - 1st attempt

2018-02-17 Thread 'awokd' via qubes-users
On Sat, February 17, 2018 10:11 pm, '[799]' via qubes-users wrote:

> xclip -selection clipboard -t image/png
> /home/user/QubesIncoming/dom0/qvm-screenshot-to-clipboard.png

Can't really find a man page for xclip. What happens when you run this in
dom0?

qvm-run $MyAppVM 'xclip -t image/png
/home/user/QubesIncoming/dom0/qvm-screenshot-to-clipboard.png'


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b838662be09cf45009b8764c634b23bd.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.